<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[RSS Feed]]></title><description><![CDATA[RSS Feed]]></description><link>http://direct.ecency.com</link><image><url>http://direct.ecency.com/logo512.png</url><title>RSS Feed</title><link>http://direct.ecency.com</link></image><generator>RSS for Node</generator><lastBuildDate>Thu, 09 Apr 2026 22:34:25 GMT</lastBuildDate><atom:link href="http://direct.ecency.com/@uncloak/rss" rel="self" type="application/rss+xml"/><item><title><![CDATA[**UK companies are being swamped with undetected crypto-jacking malware**]]></title><description><![CDATA[By Emmanuel Marshall 30% of large UK companies were targeted by crypto-jacking cyber-attacks during one thirty day period, according to a recent survey. That staggering figure is a new indicator of the]]></description><link>http://direct.ecency.com/crypto-jacking/@uncloak/uk-companies-are-being-swamped-with-undetected-crypto-jacking-malware</link><guid isPermaLink="true">http://direct.ecency.com/crypto-jacking/@uncloak/uk-companies-are-being-swamped-with-undetected-crypto-jacking-malware</guid><category><![CDATA[crypto-jacking]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Thu, 13 Sep 2018 19:45:57 GMT</pubDate><enclosure url="https://images.ecency.com/p/32FTXiZsHoAW6noHJDhrg3W8ZKHVFSsLYM859aTDCF8iErLvTsyzX55qr7RZFuq3dnNuM7viVxcEW5r89C81Ec7B12ysW7ZPttdYomLffbGfbckJp7Xp3jKungYtcCW3HTJGG4oQLCNheHC2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[**The workflow (and dental health) of testers can be improved**]]></title><description><![CDATA[By Phil Jackson Testers are the quality assurance gatekeepers for organisations’ applications. They’re typically meticulous, level-headed people not given to emotional excesses, but if you want to hear]]></description><link>http://direct.ecency.com/cyberthreat/@uncloak/the-workflow-and-dental-health-of-testers-can-be-improved</link><guid isPermaLink="true">http://direct.ecency.com/cyberthreat/@uncloak/the-workflow-and-dental-health-of-testers-can-be-improved</guid><category><![CDATA[cyberthreat]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Tue, 11 Sep 2018 20:01:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/2r8F9rTBenJQfQgENfxADE6EVYabczqmSF5KeWefV5WL9W9sZ51dvAG2KG2DVPiZynf8UkEV5ZF2xprXek9D5wAqDL4YjXx92TqT9dJaMJxmkjZDBmAPU4cczKveZK9qx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[People are vulnerable targets for hackers]]></title><description><![CDATA[By Emmanuel Marshall If your mental image of hacking is a bunch of scruffy teenagers in a basement furiously punching code into a screen as they try and beat a supercomputer in a virtual espionage contest,]]></description><link>http://direct.ecency.com/hackers/@uncloak/people-are-vulnerable-targets-for-hackers</link><guid isPermaLink="true">http://direct.ecency.com/hackers/@uncloak/people-are-vulnerable-targets-for-hackers</guid><category><![CDATA[hackers]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 10 Sep 2018 17:33:00 GMT</pubDate><enclosure url="https://images.ecency.com/p/3jpR3paJ37V8JxyWvtbhvcm5k3roJwHBR4WTALx7XaoRovVzPuycQgGqmyjf6NCQToHixBdrnrTM154Q2WUkRH4zXFgs8VrDjAsXGb4cTN2U9SPuffxva9TExDLzDdoUgP5tA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[GDPR will cost unprepared companies big money]]></title><description><![CDATA[The EU GDPR guidelines stipulate that companies must “install appropriate technical and organisational safeguards that ensure the security of the personal data, including protection against unauthorised]]></description><link>http://direct.ecency.com/cyberattacks/@uncloak/gdpr-will-cost-unprepared-companies-big-money</link><guid isPermaLink="true">http://direct.ecency.com/cyberattacks/@uncloak/gdpr-will-cost-unprepared-companies-big-money</guid><category><![CDATA[cyberattacks]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Tue, 04 Sep 2018 12:39:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/3W72119s5BjVs3Hye1oHX44R9EcpQD5C9xXzj68nJaq3CeBxEXr7wa8zjaHW97e2hxGgicRBhh5bErHxVP5L8eGAPTQwF294iCpAM7fwHmt3xvd38WvRYA?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain is only as useful as the DApp it’s powering]]></title><description><![CDATA[New technologies always inspire a lot of bad ideas as well as good ones — think of the missteps and failures that litter the history motor vehicles — so it takes careful analysis to discern the useful]]></description><link>http://direct.ecency.com/blockchain/@uncloak/3rthnc-blockchain-is-only-as-useful-as-the-dapp-it-s-powering</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/3rthnc-blockchain-is-only-as-useful-as-the-dapp-it-s-powering</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 03 Sep 2018 15:31:36 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZgCspgraVp413qcNzevDt9UMSMJq4yVHtSa2P9s8HBpxQFqEAcFgt9zaQxBagai6P2Mc6HkgXaZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[5 things every business needs to know about internet security]]></title><description><![CDATA[Data breaches are caused by criminal attacks It’s a persistent misconception about cyber-attacks that they are perpetrated by IT whiz-kids who break into servers using ingenious code and high-tech gadgets.]]></description><link>http://direct.ecency.com/cybersecurity/@uncloak/5-things-every-business-needs-to-know-about-internet-security</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@uncloak/5-things-every-business-needs-to-know-about-internet-security</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 03 Sep 2018 15:22:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2gsjgna1uruv8X2R8t7XDv5HGXyHWCCu4rKmbB5pmEzjYSse6W7VXxDCeU9Du1kxWBDWCSeFvbpUi2KemMiHKwoGuv3a1RnCrXAZ8bBXB9A1QeGoBc?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[AI and cybercrime: dangerous weapon or ultimate defence?]]></title><description><![CDATA[Imagine intelligent software that can impersonate anybody and use stolen identities to defraud companies of million dollars; an AI bot that can trawl through billions of internet pages, social media profiles]]></description><link>http://direct.ecency.com/security/@uncloak/ai-and-cybercrime-dangerous-weapon-or-ultimate-defence</link><guid isPermaLink="true">http://direct.ecency.com/security/@uncloak/ai-and-cybercrime-dangerous-weapon-or-ultimate-defence</guid><category><![CDATA[security]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 03 Sep 2018 15:09:24 GMT</pubDate><enclosure url="https://images.ecency.com/p/2N61tyyncFaFVtpM8rCsJzDgecVMtkz4jpzBsszXjhqan9mCnHHpkRYB2XCCUuS2Pr4YgmnRQ2hyYbUHHjGuSretDDWmXJSWHhQHEfLFnHfcLSsDqnQ9iubmsRPQg2K7eW1Fb2RmLFx2?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Blockchain is only as useful as the DApp it’s powering]]></title><description><![CDATA[New technologies always inspire a lot of bad ideas as well as good ones - think of the missteps and failures that litter the history motor vehicles - so it takes careful analysis to discern the useful]]></description><link>http://direct.ecency.com/blockchain/@uncloak/blockchain-is-only-as-useful-as-the-dapp-it-s-powering</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/blockchain-is-only-as-useful-as-the-dapp-it-s-powering</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Fri, 31 Aug 2018 15:38:12 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZgCspgraVp413qcNzevDt9UMSMJq4yVHtSa2P9s8HBpxQFqEAcFgt9zaQxBagai6P2Mc6HkgXaZ4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak’s Blockchain tokens represent real-world value]]></title><description><![CDATA[Uncloak is an unprecedented community of cybersecurity specialists working together to protect organisations from data-breaches. Uncloak is a DApp, a secure Blockchain cloud service, which is what makes]]></description><link>http://direct.ecency.com/blockchain/@uncloak/uncloak-s-blockchain-tokens-represent-real-world-value</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/uncloak-s-blockchain-tokens-represent-real-world-value</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Fri, 31 Aug 2018 09:30:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/FUkUE5bzkAZSUQtscsBsFx5imG6WU3gSfePkK5Gond6i734VDLFP5Q6Kam5xXWzkkdXQR4uKRRPk8nbn5NBCwKFQKrLj2WbY5enoNLmv6QpDSwzh2R1tskzYoCqWRGtpBYs4qyKPsWf3GZaMNoFbwrcaFwmrfba4GZw4?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak announces TLDR as Strategic Advisor]]></title><description><![CDATA[Uncloak are excited to announce our partnership with TLDR to help boost continued investment in Uncloak globally. About TLDR TLDR is a global advisory firm that specialises in tokenisation projects and]]></description><link>http://direct.ecency.com/bitcoin/@uncloak/uncloak-announces-tldr-as-strategic-advisor</link><guid isPermaLink="true">http://direct.ecency.com/bitcoin/@uncloak/uncloak-announces-tldr-as-strategic-advisor</guid><category><![CDATA[bitcoin]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Fri, 17 Aug 2018 13:25:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPZgyx9WZhBYPKhErxn5CLLxaeVMZSZDGzNwwPmBb7Fr9a3VpwVYUUkdszVZTTHkFFbFEcHsDyQ?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Block.one speaks to Tayo Dada]]></title><description><![CDATA[Block.one speaks to Tayo Dada, founder and CEO of “the world’s first blockchain-powered cyber-threat solution”. Uncloak Aims To Outsmart Hackers:]]></description><link>http://direct.ecency.com/blockchain/@uncloak/block-one-speaks-to-tayo-dada</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/block-one-speaks-to-tayo-dada</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Thu, 16 Aug 2018 11:03:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/3DLAmCsuTe3bV13dhrdWmiiTzq9WMPZDTkYuSGyZVu3GHrK9zmbQMTb2tmmfGvbKVknHrMRY9HQS8nHybvaHEEYwQw5cAwjD9FFZfmL9XFUX3VcYQh67DbTA4J3Fem9mQhHL2nwvEBjTJeuf19QHSy6Hdexoagn?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Companies need a better way to protect critical computer infrastructure]]></title><description><![CDATA[By Emmanuel Marshall Being unable to access your email account can be a major inconvenience, but in the big picture of what can happen in cybersecurity breaches, there are far worse outcomes. Imagine the]]></description><link>http://direct.ecency.com/cybersecurity/@uncloak/companies-need-a-better-way-to-protect-critical-computer-infrastructure</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@uncloak/companies-need-a-better-way-to-protect-critical-computer-infrastructure</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Wed, 15 Aug 2018 20:23:45 GMT</pubDate><enclosure url="https://images.ecency.com/p/qjrE4yyfw5pEPvDbJDzhdNXM7mjt1tbr2kM3X28F6SraZekrmTNkJKgFfUAfwACY8oHqU99EfFgbXgG4homEuJj6vPeJb6NxKzB9n8irnF1qnHx6ZaHVXKmx?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak's Threat Bounty Program: protecting companies from cyber-attack]]></title><description><![CDATA[By Emmanuel Marshall Imagine a new kind of cybersecurity service that coordinates the efforts of thousands of expert researchers and ethical hackers across the planet in real-time. Bug hunters, computer]]></description><link>http://direct.ecency.com/cyberattack/@uncloak/uncloak-s-threat-bounty-program-protecting-companies-from-cyber-attack</link><guid isPermaLink="true">http://direct.ecency.com/cyberattack/@uncloak/uncloak-s-threat-bounty-program-protecting-companies-from-cyber-attack</guid><category><![CDATA[cyberattack]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Thu, 09 Aug 2018 21:10:48 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNfW6zTkv1M6hAc7GY9dbvDgLJpfM5LFzHo3k4TtbVJ5E1qicEksMd1ngRRH7f5zCjVykp3NJx6?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Understanding Uncloak: Q & A with AI & Blockchain Advisor Asad Mahmood]]></title><description><![CDATA[By Emmanuel Marshall “This is a user-friendly platform designed to bring the expertise of top cybersecurity experts within reach of every business whether they are massive corporations or tiny startups]]></description><link>http://direct.ecency.com/uncloak/@uncloak/understanding-uncloak-q-and-a-with-ai-and-blockchain-advisor-asad-mahmood</link><guid isPermaLink="true">http://direct.ecency.com/uncloak/@uncloak/understanding-uncloak-q-and-a-with-ai-and-blockchain-advisor-asad-mahmood</guid><category><![CDATA[uncloak]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Tue, 07 Aug 2018 21:06:54 GMT</pubDate><enclosure url="https://images.ecency.com/p/HNWT6DgoBc14riaEeLCzGYopkqYBKxpGKqfNWfgr368M9WVZpNguh8yAoWzepagtnPT3SFDWehMXBZD7iVF4VSz5mZsCtXyMZsqJddxbZKuP92BJKusf87mDEVU?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Why choose Uncloak as your cybersecurity solution?]]></title><description><![CDATA[“Cybersecurity risks are growing… Attacks against businesses have almost doubled in five years, and incidents that would once have been considered extraordinary are becoming more and more commonplace…]]></description><link>http://direct.ecency.com/cybersecurity/@uncloak/why-choose-uncloak-as-your-cybersecurity-solution</link><guid isPermaLink="true">http://direct.ecency.com/cybersecurity/@uncloak/why-choose-uncloak-as-your-cybersecurity-solution</guid><category><![CDATA[cybersecurity]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 06 Aug 2018 11:04:51 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iPTnroMrpmZdSe2aTrJsMALisSiRmsTU4FWBePYeWWeobowd2iRVaL7m9NjRezAeAXmcbyqG5sk?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak announces Asad Mahmood as Strategic Advisor]]></title><description><![CDATA[Asad Mahmood, M.D. has joined the Uncloak™ team as an AI and Blockchain strategic advisor]]></description><link>http://direct.ecency.com/blockchain/@uncloak/uncloak-announces-asad-mahmood-as-strategic-advisor</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/uncloak-announces-asad-mahmood-as-strategic-advisor</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Thu, 31 May 2018 14:28:27 GMT</pubDate><enclosure url="https://images.ecency.com/p/C3TZR1g81UNaPs7vzNXHueW5ZM76DSHWEY7onmfLxcK2iNg2nccAbqVeCx2EPw3crPAh7wA3X4np5yvnkBg8bggZkR1goVhzugdcs161UQaRidgrYmSbKFL?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak: EOSIO powered cyber threat solution  + HKEOS: What is a Block Producer?]]></title><description><![CDATA[Uncloak: EOSIO powered cyber threat solution + HKEOS: What is a Block Producer? Tue, May 29, 2018, 6:30 PM: We are pleased to present two EOS.IO based projects:1. Uncloak, the world’s first blockchain]]></description><link>http://direct.ecency.com/blockchain/@uncloak/uncloak-eosio-powered-cyber-threat-solution-hkeos-what-is-a-block-producer</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/uncloak-eosio-powered-cyber-threat-solution-hkeos-what-is-a-block-producer</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Mon, 21 May 2018 08:10:15 GMT</pubDate><enclosure url="https://images.ecency.com/p/NTy4GV6ooFRqCG5rjPjuCc5Tfztwk69Ee6BR531S2HbdPDYuPyqiYrBakwo3WjEAL4Xfyneifub61V5kU6HQvoH8tt7gNeqy9X4v3tkKn4oESZ7qzeLpGCUWJVgqZb88BGuiW7ED3RjPE7W8bWWCcxnkWk94LATe6FGPqkK8?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Our AMA session with world-renowned cryptocurrency investor, Ian Balina.]]></title><description><![CDATA[🚨🚨Exciting News.🚨🚨 We at Uncloak are thrilled to announce to our community, our AMA session with world-renowned cryptocurrency investor, Ian Balina. Our CEO Tayo Dada will be speaking with Ian. The]]></description><link>http://direct.ecency.com/blockchain/@uncloak/our-ama-session-with-world-renowned-cryptocurrency-investor-ian-balina</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/our-ama-session-with-world-renowned-cryptocurrency-investor-ian-balina</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Thu, 17 May 2018 15:00:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/7258xSVeJbKmJaoFt8pgsQW7zWetygEstFqFJbGLVHPnWnMJXGiE9yBbAKF36TnnkXaFasCagf7Rd5xcvwHmZEMBHHscd1dcHyREPZ1pExYgLX6851xtTHEvHcSn8ApQ3hGR1PDHVDKAv?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Colorado Passes Bill Advocating Blockchain For  Gov’t Data Protection And Cyber Security]]></title><description><![CDATA[Colorado Passes Bill Advocating Blockchain For Gov’t Data Protection And Cyber Security By Marie Huillet • 9 May 2018 The Colorado Senate passed a bill on May 7 that involves using blockchain tech for]]></description><link>http://direct.ecency.com/blockchain/@uncloak/colorado-passes-bill-advocating-blockchain-for-gov-t-data-protection-and-cyber-security</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/colorado-passes-bill-advocating-blockchain-for-gov-t-data-protection-and-cyber-security</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Wed, 09 May 2018 18:08:42 GMT</pubDate><enclosure url="https://images.ecency.com/p/2nhMph8Yo3jHyfsfBxm3raDEGrffBkSsHnPoxzrm4dYWhvku5Wv5j1hheHX5DbswXxcNfq66wRCbiAPbMWD3bR9fkypxxdEqPv5CkVeF7rDNCHHTnhQ51bP16KACxc19mXMc84MwKCUaVZTg4WbpgD27W5bY7d7h8tfZ8i5Mb6hRCoVPLz2iA3f4a?format=match&amp;mode=fit" length="0" type="false"/></item><item><title><![CDATA[Uncloak.io Review by Cryptolaboratory]]></title><description><![CDATA[UNCLOAK (UNC/UCC) Website: Whitepaper: Lightpaper: Bounty: Telegram: Twitter: Next Generation Cyber Security Threat Management Update as of 05/08/2018 PROJECT SUMMARY Uncloak means ‘demystify’ or ‘unmask’.]]></description><link>http://direct.ecency.com/blockchain/@uncloak/uncloak-io-review-by-cryptolaboratory</link><guid isPermaLink="true">http://direct.ecency.com/blockchain/@uncloak/uncloak-io-review-by-cryptolaboratory</guid><category><![CDATA[blockchain]]></category><dc:creator><![CDATA[uncloak]]></dc:creator><pubDate>Sun, 06 May 2018 15:32:21 GMT</pubDate><enclosure url="https://images.ecency.com/p/23KQwnti57stsAqnmSXB7pJSiMYYP3x2q8FpPkBo9m4CMhzC8K9Xk6YRMAXU7BXEhRQVP2r3yGK9LeSw5A6YXYs7Q7XCAcW?format=match&amp;mode=fit" length="0" type="false"/></item></channel></rss>